infynon 0.2.0-beta.6.2 โ 0.2.0-beta.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +60 -547
- package/package.json +2 -3
package/README.md
CHANGED
|
@@ -1,617 +1,130 @@
|
|
|
1
|
-
|
|
2
|
-
<h1 align="center">๐ก๏ธ INFYNON</h1>
|
|
3
|
-
<p align="center">
|
|
4
|
-
<strong>Network Firewall & Dependency Security Manager</strong><br/>
|
|
5
|
-
Real-time reverse proxy WAF with TUI dashboard + pre-install CVE verification for 14 ecosystems.
|
|
6
|
-
</p>
|
|
7
|
-
</p>
|
|
8
|
-
|
|
9
|
-
<p align="center">
|
|
10
|
-
<a href="https://github.com/d4rkNinja/infynon-cli/stargazers">
|
|
11
|
-
<img src="https://img.shields.io/github/stars/d4rkNinja/infynon-cli?style=for-the-badge" />
|
|
12
|
-
</a>
|
|
13
|
-
<a href="https://github.com/d4rkNinja/infynon-cli/issues">
|
|
14
|
-
<img src="https://img.shields.io/github/issues/d4rkNinja/infynon-cli?style=for-the-badge" />
|
|
15
|
-
</a>
|
|
16
|
-
<a href="https://github.com/d4rkNinja/infynon-cli/blob/main/LICENSE">
|
|
17
|
-
<img src="https://img.shields.io/github/license/d4rkNinja/infynon-cli?style=for-the-badge" />
|
|
18
|
-
</a>
|
|
19
|
-
<img src="https://img.shields.io/badge/ecosystems-14-blue?style=for-the-badge" />
|
|
20
|
-
<img src="https://img.shields.io/badge/lockfiles-15-purple?style=for-the-badge" />
|
|
21
|
-
<img src="https://img.shields.io/badge/version-0.2.0--beta.6.2-orange?style=for-the-badge" />
|
|
22
|
-
<a href="https://www.npmjs.com/package/infynon">
|
|
23
|
-
<img src="https://img.shields.io/npm/v/infynon?style=for-the-badge&logo=npm&label=npm" />
|
|
24
|
-
</a>
|
|
25
|
-
<a href="https://github.com/d4rkNinja/infynon-cli/tree/development">
|
|
26
|
-
<img src="https://img.shields.io/badge/channel-development-blueviolet?style=for-the-badge" />
|
|
27
|
-
</a>
|
|
28
|
-
</p>
|
|
29
|
-
|
|
30
|
-
<p align="center">
|
|
31
|
-
<strong>๐ซ AI generates code, installs packages โ you don't know what's compromised</strong><br/>
|
|
32
|
-
<strong>โ
INFYNON catches it before it touches your system</strong>
|
|
33
|
-
</p>
|
|
34
|
-
|
|
35
|
-
<p align="center">
|
|
36
|
-
<a href="#-quick-start">Quick Start</a> โข
|
|
37
|
-
<a href="#-why-infynon">Why INFYNON</a> โข
|
|
38
|
-
<a href="#-how-it-works">How It Works</a> โข
|
|
39
|
-
<a href="#-key-features">Features</a> โข
|
|
40
|
-
<a href="#-firewall-mode-v020">Firewall</a> โข
|
|
41
|
-
<a href="#-installation">Install</a> โข
|
|
42
|
-
<a href="#-development-channel">Dev Channel</a> โข
|
|
43
|
-
<a href="https://cli.infynon.com/docs">Docs</a>
|
|
44
|
-
</p>
|
|
1
|
+
# INFYNON
|
|
45
2
|
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
## โก What is INFYNON?
|
|
49
|
-
|
|
50
|
-
INFYNON is a **security CLI** written in Rust with two modes:
|
|
51
|
-
|
|
52
|
-
1. **`infynon` โ Network Firewall**: A real-time reverse proxy WAF that sits between the internet and your backend. Inspects, filters, and blocks HTTP traffic with a TUI dashboard. Self-hosted Cloudflare alternative.
|
|
53
|
-
2. **`infynon pkg` โ Package Security**: A pre-installation firewall for dependencies across 14 ecosystems. Stops compromised packages before they touch your system.
|
|
54
|
-
|
|
55
|
-
### The Problem INFYNON Solves
|
|
56
|
-
|
|
57
|
-
**In the age of vibe coding and AI-generated code**, developers and AI tools install packages without knowing if they're compromised. An AI assistant writes `npm install some-package` โ but that package could be:
|
|
58
|
-
|
|
59
|
-
- **Typosquatted** (looks like a real package, isn't)
|
|
60
|
-
- **Supply-chain attacked** (legitimate package, now hijacked)
|
|
61
|
-
- **Carrying known CVEs** that nobody checked
|
|
62
|
-
|
|
63
|
-
By the time `npm audit` tells you something is wrong, it's already on your disk. **INFYNON intercepts the install command itself** โ scanning before the package ever reaches your machine.
|
|
64
|
-
|
|
65
|
-
### `infynon` โ Network Firewall (v0.2.0)
|
|
66
|
-
|
|
67
|
-
```
|
|
68
|
-
Internet โ INFYNON Firewall โ Nginx / App Server โ Your Application
|
|
69
|
-
```
|
|
70
|
-
|
|
71
|
-
A self-hosted Cloudflare WAF โ IP filtering, rate limiting, SQL injection detection, XSS protection, custom rules, maintenance mode, multi-upstream routing, all with a real-time TUI monitor.
|
|
72
|
-
|
|
73
|
-
### `infynon pkg` โ Package Security
|
|
74
|
-
|
|
75
|
-
A **pre-installation firewall for dependencies**.
|
|
76
|
-
|
|
77
|
-
Traditional tools like `npm audit`, `pip audit`, or Dependabot:
|
|
78
|
-
- scan **after installation** โ the damage is already done
|
|
79
|
-
- notify you **after exposure** โ too late
|
|
80
|
-
- require manual remediation โ wastes your time
|
|
81
|
-
|
|
82
|
-
> `infynon pkg` **intercepts the install command**, analyzes dependencies in real-time,
|
|
83
|
-
> and blocks or fixes vulnerabilities *before they enter your system*.
|
|
84
|
-
> Whether you typed the command or an AI did โ INFYNON has your back.
|
|
85
|
-
|
|
86
|
-
---
|
|
87
|
-
|
|
88
|
-
## ๐ฏ Why INFYNON?
|
|
89
|
-
|
|
90
|
-
### The Problem
|
|
3
|
+
**Network Firewall & Dependency Security Manager**
|
|
91
4
|
|
|
92
|
-
-
|
|
93
|
-
- **Vibe coding** means moving fast, not verifying every dependency
|
|
94
|
-
- Supply chain attacks are increasing (typosquatting, malicious updates, hijacked packages)
|
|
95
|
-
- Traditional tools are **reactive** โ they tell you AFTER the compromise
|
|
96
|
-
- Your server is exposed to scanners, bots, and attacks 24/7 without a WAF
|
|
5
|
+
Real-time reverse proxy WAF with TUI dashboard + pre-install CVE verification for 14 ecosystems.
|
|
97
6
|
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
INFYNON introduces **preventive security** at two levels:
|
|
7
|
+
[](https://www.npmjs.com/package/infynon)
|
|
8
|
+
[](https://github.com/d4rkNinja/infynon-cli/blob/main/LICENSE)
|
|
9
|
+
[](https://github.com/d4rkNinja/infynon-cli)
|
|
103
10
|
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
| AI runs `npm install x` โ compromised package installed โ `npm audit` finds it later | AI runs `infynon pkg npm install x` โ CVE detected โ blocked before install |
|
|
107
|
-
| Internet โ Your server โ attacked | Internet โ INFYNON WAF โ filtered โ Your server |
|
|
108
|
-
|
|
109
|
-
This prevents:
|
|
110
|
-
- compromised packages entering your codebase (whether installed by you or AI)
|
|
111
|
-
- SQL injection, XSS, and bot attacks hitting your backend
|
|
112
|
-
- production risks caused by unnoticed CVEs
|
|
11
|
+
> AI generates code, installs packages โ you don't know what's compromised.
|
|
12
|
+
> **INFYNON catches it before it touches your system.**
|
|
113
13
|
|
|
114
14
|
---
|
|
115
15
|
|
|
116
|
-
##
|
|
117
|
-
|
|
118
|
-
1. **Intercept install command**
|
|
119
|
-
```bash
|
|
120
|
-
infynon pkg npm install express
|
|
121
|
-
```
|
|
122
|
-
|
|
123
|
-
2. **Resolve dependency tree**
|
|
124
|
-
|
|
125
|
-
* Detects ecosystem automatically
|
|
126
|
-
* Parses lock files or registry metadata
|
|
127
|
-
|
|
128
|
-
3. **Query vulnerability database**
|
|
129
|
-
|
|
130
|
-
* Uses **OSV.dev** for real CVE intelligence
|
|
131
|
-
* Batch scans all dependencies
|
|
132
|
-
|
|
133
|
-
4. **Analyze & classify**
|
|
134
|
-
|
|
135
|
-
* Severity levels (Critical / High / Medium / Low)
|
|
136
|
-
* Affected versions
|
|
137
|
-
* Suggested safe upgrades
|
|
138
|
-
|
|
139
|
-
5. **Interactive decision layer**
|
|
140
|
-
|
|
141
|
-
* Approve / Skip / Upgrade per package
|
|
142
|
-
* Apply rules globally
|
|
143
|
-
|
|
144
|
-
6. **Execute safe installation**
|
|
145
|
-
|
|
146
|
-
* Only installs approved or fixed packages
|
|
147
|
-
|
|
148
|
-
---
|
|
149
|
-
|
|
150
|
-
## ๐ Key Features
|
|
151
|
-
|
|
152
|
-
### ๐ Security First
|
|
153
|
-
|
|
154
|
-
* **Pre-install CVE scanning**
|
|
155
|
-
* Blocks vulnerable packages before execution
|
|
156
|
-
* OSV-powered vulnerability intelligence
|
|
157
|
-
|
|
158
|
-
### ๐ Multi-Ecosystem Support
|
|
16
|
+
## Install
|
|
159
17
|
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
```
|
|
163
|
-
npm โข yarn โข pnpm โข bun
|
|
164
|
-
pip โข uv โข poetry
|
|
165
|
-
cargo โข go
|
|
166
|
-
gem โข composer โข nuget
|
|
167
|
-
hex โข pub
|
|
18
|
+
```bash
|
|
19
|
+
npm install -g infynon
|
|
168
20
|
```
|
|
169
21
|
|
|
170
|
-
|
|
171
|
-
|
|
172
|
-
### ๐ง Smart Detection
|
|
22
|
+
Downloads the right pre-built native binary for your OS and architecture automatically. Requires Node.js 14+.
|
|
173
23
|
|
|
174
|
-
|
|
175
|
-
* Supports **15+ lock file formats**
|
|
176
|
-
* Works without configuration
|
|
24
|
+
**Supported platforms:** Windows x64 ยท Linux x64 ยท Linux ARM64 ยท macOS x64 ยท macOS ARM64
|
|
177
25
|
|
|
178
|
-
|
|
179
|
-
|
|
180
|
-
### โก Developer Experience
|
|
181
|
-
|
|
182
|
-
* Interactive install prompts
|
|
183
|
-
* Minimal friction workflow
|
|
184
|
-
* Single binary โ no setup required
|
|
185
|
-
|
|
186
|
-
---
|
|
187
|
-
|
|
188
|
-
### ๐ ๏ธ Auto Remediation
|
|
189
|
-
|
|
190
|
-
* `infynon pkg fix --auto` upgrades all vulnerable dependencies
|
|
191
|
-
* `infynon pkg scan --fix high` targets critical + high only
|
|
192
|
-
* Suggests safe versions from OSV.dev
|
|
193
|
-
|
|
194
|
-
---
|
|
195
|
-
|
|
196
|
-
### ๐ซ CI Enforcement
|
|
26
|
+
To uninstall and clean up all config files:
|
|
197
27
|
|
|
198
28
|
```bash
|
|
199
|
-
|
|
29
|
+
npm uninstall -g infynon
|
|
200
30
|
```
|
|
201
31
|
|
|
202
|
-
* Fails build on any vulnerability
|
|
203
|
-
* Ideal for pipelines and teams
|
|
204
|
-
|
|
205
32
|
---
|
|
206
33
|
|
|
207
|
-
|
|
34
|
+
## What is INFYNON?
|
|
208
35
|
|
|
209
|
-
|
|
210
|
-
* Includes CVE details, severity breakdown, upgrade suggestions
|
|
36
|
+
A single binary with two modes:
|
|
211
37
|
|
|
212
|
-
|
|
38
|
+
### 1. `infynon pkg` โ Package Security
|
|
213
39
|
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
| Command | Description |
|
|
217
|
-
|---------|-------------|
|
|
218
|
-
| `infynon pkg audit` | Recursive dependency tree with CVE annotations |
|
|
219
|
-
| `infynon pkg why <pkg>` | Trace why a package is in your tree |
|
|
220
|
-
| `infynon pkg outdated` | Detect outdated deps across all ecosystems |
|
|
221
|
-
| `infynon pkg diff <pkg> v1 v2` | Compare versions: size, deps, scripts, CVEs |
|
|
222
|
-
| `infynon pkg doctor` | Health check: dupes, unused, phantoms, missing locks |
|
|
223
|
-
| `infynon pkg size <pkg>` | Install weight and transitive dep count |
|
|
224
|
-
| `infynon pkg search <query>` | Cross-ecosystem search (npm, crates, PyPI, โฆ) |
|
|
225
|
-
| `infynon pkg clean` | Find and remove unused dependencies |
|
|
226
|
-
| `infynon pkg migrate <from> <to>` | Migrate between package managers |
|
|
227
|
-
| `infynon pkg eagle-eye setup` | Interactive setup for scheduled CVE monitoring |
|
|
228
|
-
| `infynon pkg eagle-eye start` | Start Eagle Eye scheduled vulnerability scanner |
|
|
229
|
-
| `infynon pkg eagle-eye status` | Show Eagle Eye configuration and status |
|
|
230
|
-
| `infynon pkg eagle-eye enable/disable` | Toggle Eagle Eye monitoring |
|
|
231
|
-
|
|
232
|
-
---
|
|
233
|
-
|
|
234
|
-
## ๐ Demo
|
|
235
|
-
|
|
236
|
-
### ๐ Dependency Scan
|
|
237
|
-
|
|
238
|
-
<p align="center">
|
|
239
|
-
<img src="assets/scan-demo.png" width="750"/>
|
|
240
|
-
</p>
|
|
241
|
-
|
|
242
|
-
### ๐ก๏ธ Secure Installation Flow
|
|
243
|
-
|
|
244
|
-
<p align="center">
|
|
245
|
-
<img src="assets/install-demo.png" width="750"/>
|
|
246
|
-
</p>
|
|
247
|
-
|
|
248
|
-
---
|
|
249
|
-
|
|
250
|
-
## โก Quick Start
|
|
40
|
+
Intercepts install commands across **14 ecosystems** and runs a 3-layer CVE check before anything touches your disk.
|
|
251
41
|
|
|
252
42
|
```bash
|
|
253
|
-
# Scan project
|
|
43
|
+
# Scan your project's lock files for CVEs
|
|
254
44
|
infynon pkg scan
|
|
255
45
|
|
|
256
|
-
# Secure install โ
|
|
46
|
+
# Secure install โ intercepts and checks before running npm
|
|
257
47
|
infynon pkg npm install express
|
|
48
|
+
|
|
49
|
+
# Works with any ecosystem
|
|
258
50
|
infynon pkg cargo add serde
|
|
259
51
|
infynon pkg pip install requests
|
|
52
|
+
infynon pkg yarn add lodash
|
|
260
53
|
|
|
261
54
|
# Auto-fix all vulnerable dependencies
|
|
262
55
|
infynon pkg fix --auto
|
|
263
56
|
|
|
264
|
-
# Deep audit with dependency tree
|
|
57
|
+
# Deep audit with full dependency tree
|
|
265
58
|
infynon pkg audit
|
|
266
59
|
|
|
267
|
-
#
|
|
268
|
-
infynon pkg why lodash
|
|
269
|
-
|
|
270
|
-
# Check for outdated deps
|
|
271
|
-
infynon pkg outdated
|
|
272
|
-
|
|
273
|
-
# Compare two versions of a package
|
|
274
|
-
infynon pkg diff express 4.17.1 4.18.2
|
|
275
|
-
|
|
276
|
-
# Dependency health check
|
|
277
|
-
infynon pkg doctor
|
|
278
|
-
|
|
279
|
-
# Package size & weight
|
|
280
|
-
infynon pkg size express
|
|
281
|
-
|
|
282
|
-
# Cross-ecosystem search
|
|
283
|
-
infynon pkg search http-client
|
|
284
|
-
|
|
285
|
-
# Remove unused deps
|
|
286
|
-
infynon pkg clean
|
|
287
|
-
|
|
288
|
-
# Migrate npm โ pnpm
|
|
289
|
-
infynon pkg migrate npm pnpm
|
|
290
|
-
|
|
291
|
-
# Export PDF report
|
|
292
|
-
infynon pkg scan --output pdf
|
|
293
|
-
|
|
294
|
-
# Strict mode for CI
|
|
60
|
+
# Strict mode โ fail build on any vulnerability (great for CI)
|
|
295
61
|
infynon pkg --strict npm install express
|
|
296
62
|
```
|
|
297
63
|
|
|
298
|
-
|
|
299
|
-
|
|
300
|
-
## ๐ฅ Installation
|
|
301
|
-
|
|
302
|
-
### npm (recommended โ works on all platforms)
|
|
303
|
-
|
|
304
|
-
```bash
|
|
305
|
-
npm install -g infynon
|
|
306
|
-
```
|
|
307
|
-
|
|
308
|
-
Downloads the right pre-built binary for your OS and architecture automatically. Requires Node.js 14+.
|
|
309
|
-
|
|
310
|
-
To uninstall completely (removes binary + all config files from `~/.infynon/`):
|
|
311
|
-
|
|
312
|
-
```bash
|
|
313
|
-
npm uninstall -g infynon
|
|
314
|
-
```
|
|
315
|
-
|
|
316
|
-
---
|
|
317
|
-
|
|
318
|
-
### Linux / macOS (shell script)
|
|
319
|
-
|
|
320
|
-
```bash
|
|
321
|
-
curl -fsSL https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.sh | bash
|
|
322
|
-
```
|
|
323
|
-
|
|
324
|
-
### Windows (PowerShell)
|
|
64
|
+
**Ecosystems:** npm ยท yarn ยท pnpm ยท bun ยท pip ยท uv ยท poetry ยท cargo ยท go ยท gem ยท composer ยท nuget ยท hex ยท pub
|
|
325
65
|
|
|
326
|
-
|
|
327
|
-
irm https://raw.githubusercontent.com/d4rkNinja/infynon-cli/main/scripts/install.ps1 | iex
|
|
328
|
-
```
|
|
66
|
+
### 2. `infynon` โ Network Firewall
|
|
329
67
|
|
|
330
|
-
|
|
68
|
+
A reverse proxy WAF with a real-time TUI dashboard. Sits between the internet and your backend.
|
|
331
69
|
|
|
332
70
|
```bash
|
|
333
|
-
|
|
334
|
-
```
|
|
335
|
-
|
|
336
|
-
---
|
|
337
|
-
|
|
338
|
-
## ๐งฌ Philosophy
|
|
339
|
-
|
|
340
|
-
> Security should not be an afterthought.
|
|
341
|
-
> It should be enforced by default.
|
|
342
|
-
|
|
343
|
-
INFYNON ensures that:
|
|
344
|
-
|
|
345
|
-
* every dependency is verified โ whether installed by you or an AI
|
|
346
|
-
* every HTTP request is inspected before reaching your backend
|
|
347
|
-
* every project remains secure by design, not by afterthought
|
|
348
|
-
|
|
349
|
-
---
|
|
350
|
-
|
|
351
|
-
## ๐ฅ Firewall Mode (v0.2.0)
|
|
352
|
-
|
|
353
|
-
INFYNON now includes a **real network firewall** โ a reverse proxy that inspects, filters, and blocks HTTP traffic in real time.
|
|
354
|
-
|
|
355
|
-
### Quick Start โ Firewall
|
|
356
|
-
|
|
357
|
-
```bash
|
|
358
|
-
# Initialize configuration
|
|
71
|
+
# Initialize config
|
|
359
72
|
infynon init --port 8080 --upstream-port 3000
|
|
360
73
|
|
|
361
74
|
# Start firewall with TUI dashboard
|
|
362
75
|
infynon start
|
|
363
76
|
|
|
364
|
-
# Start
|
|
77
|
+
# Start headless (no TUI โ for servers)
|
|
365
78
|
infynon start --headless
|
|
366
79
|
|
|
367
|
-
# View status
|
|
368
|
-
infynon status
|
|
369
|
-
|
|
370
80
|
# Block an IP
|
|
371
81
|
infynon block 203.0.113.50
|
|
372
82
|
|
|
373
|
-
# View
|
|
374
|
-
infynon logs --verdict block
|
|
375
|
-
|
|
376
|
-
# Validate config
|
|
377
|
-
infynon config check
|
|
378
|
-
|
|
379
|
-
# Show effective config
|
|
380
|
-
infynon config show
|
|
381
|
-
|
|
382
|
-
# Enable/disable rules
|
|
383
|
-
infynon rules list
|
|
384
|
-
infynon rules enable my-rule
|
|
385
|
-
infynon rules disable my-rule
|
|
83
|
+
# View blocked requests
|
|
84
|
+
infynon logs --verdict block
|
|
386
85
|
```
|
|
387
86
|
|
|
388
|
-
|
|
389
|
-
|
|
390
|
-
| Feature | Description |
|
|
391
|
-
|---------|-------------|
|
|
392
|
-
| **Reverse Proxy** | Sits between internet and your backend, forwards clean traffic |
|
|
393
|
-
| **Multi-Upstream Routing** | Route requests to different backends based on path prefix |
|
|
394
|
-
| **IP Filtering** | Blocklist, allowlist, CIDR range blocking |
|
|
395
|
-
| **Auto-Reputation** | Automatically bans IPs that get blocked too many times |
|
|
396
|
-
| **Rate Limiting** | Per-IP, per-path, and global rate limits with sliding window |
|
|
397
|
-
| **WAF Engine** | SQL injection, XSS, path traversal, command injection, header injection detection |
|
|
398
|
-
| **Custom Rules** | IF-THEN rules with combinable conditions and priority ordering |
|
|
399
|
-
| **Maintenance Mode** | Toggle maintenance page for all visitors (from TUI or config) |
|
|
400
|
-
| **TUI Dashboard** | 7 real-time views: Dashboard, Live Feed, Blocked, IP Inspector, Rules, Stats, Config |
|
|
401
|
-
| **Live Config Editing** | Edit all firewall settings directly from the TUI with instant apply |
|
|
402
|
-
| **Hot Config Reload** | Edit `infynon.toml` โ changes auto-detected and applied within seconds |
|
|
403
|
-
| **Email Alerts** | SMTP/AWS SES notifications on suspicious activity + daily digest reports |
|
|
404
|
-
| **JSONL Logging** | Structured event logging with separate blocked request log |
|
|
405
|
-
| **Cross-Platform** | Works on Linux, macOS, and Windows |
|
|
406
|
-
|
|
407
|
-
### Multi-Upstream Routing
|
|
408
|
-
|
|
409
|
-
Route different paths to different backend services:
|
|
410
|
-
|
|
411
|
-
```toml
|
|
412
|
-
# Default upstream (catches everything not matched by routes)
|
|
413
|
-
[upstream]
|
|
414
|
-
address = "127.0.0.1"
|
|
415
|
-
port = 3000
|
|
416
|
-
|
|
417
|
-
# Additional upstreams for path-based routing
|
|
418
|
-
[[upstreams]]
|
|
419
|
-
name = "api-server"
|
|
420
|
-
path_prefix = "/api"
|
|
421
|
-
address = "127.0.0.1"
|
|
422
|
-
port = 4000
|
|
423
|
-
strip_prefix = false
|
|
424
|
-
|
|
425
|
-
[[upstreams]]
|
|
426
|
-
name = "static-server"
|
|
427
|
-
path_prefix = "/static"
|
|
428
|
-
address = "127.0.0.1"
|
|
429
|
-
port = 5000
|
|
430
|
-
strip_prefix = true
|
|
431
|
-
```
|
|
432
|
-
|
|
433
|
-
### TUI Views
|
|
434
|
-
|
|
435
|
-
| Key | View | Description |
|
|
436
|
-
|-----|------|-------------|
|
|
437
|
-
| `1` | Dashboard | Live stats, sparklines, top IPs, top rules, recent events |
|
|
438
|
-
| `2` | Live Feed | All requests in real time with search and filtering |
|
|
439
|
-
| `3` | Blocked | Blocked requests with rule, stage, and reason details |
|
|
440
|
-
| `4` | IP Inspector | Search any IP โ see full history, block/unblock from TUI |
|
|
441
|
-
| `5` | Rules | Custom rules with hit counts + built-in WAF status |
|
|
442
|
-
| `6` | Stats | Traffic breakdown, verdicts, status codes, top paths |
|
|
443
|
-
| `7` | Config | Edit all settings directly โ save to file with `s` |
|
|
444
|
-
|
|
445
|
-
### TUI Keyboard Shortcuts
|
|
446
|
-
|
|
447
|
-
| Key | Action |
|
|
448
|
-
|-----|--------|
|
|
449
|
-
| `1-7` | Switch between views |
|
|
450
|
-
| `q` | Quit TUI (firewall keeps running in headless mode) |
|
|
451
|
-
| `/` | Search/filter events |
|
|
452
|
-
| `?` | Show help overlay |
|
|
453
|
-
| `r` | Reload config from file |
|
|
454
|
-
| `m` | Toggle maintenance mode |
|
|
455
|
-
| `p` | Pause/resume live feed auto-scroll |
|
|
456
|
-
| `f` | Cycle feed filter (All/Blocked/Allowed/Flagged) |
|
|
457
|
-
| `b` | Block selected IP (in IP Inspector) |
|
|
458
|
-
| `u` | Unblock selected IP (in IP Inspector) |
|
|
459
|
-
| `Enter` | Edit config field (in Config view) |
|
|
460
|
-
| `s` | Save config to file (in Config view) |
|
|
461
|
-
|
|
462
|
-
### Configuration
|
|
463
|
-
|
|
464
|
-
Run `infynon init` for interactive setup, or create `infynon.toml` manually. The config supports:
|
|
465
|
-
|
|
466
|
-
- **Server**: listen address, port, max connections, timeouts, maintenance mode
|
|
467
|
-
- **Upstream**: default backend + multiple path-based upstreams
|
|
468
|
-
- **IP Filtering**: blocklist/allowlist modes, CIDR ranges, auto-reputation banning
|
|
469
|
-
- **Rate Limiting**: global, per-IP, per-path sliding window limits
|
|
470
|
-
- **WAF**: SQLi, XSS, path traversal, command injection, header injection detection
|
|
471
|
-
- **Custom Rules**: named rules with conditions (IP, path, method, header, body, content-type, size) and actions (block, allow, flag, rate_limit)
|
|
472
|
-
- **Logging**: JSONL access/blocked/alert logs with rotation
|
|
473
|
-
- **TUI**: refresh rate, default view, theme, max events in memory
|
|
474
|
-
- **Responses**: custom block/rate-limit/maintenance pages
|
|
475
|
-
- **Email**: SMTP or AWS SES notifications โ alert on block threshold, IP ban, daily digest
|
|
476
|
-
|
|
477
|
-
Config can be edited from the TUI (view 7) or directly in the file. Changes to the file are auto-detected and hot-reloaded within seconds.
|
|
478
|
-
|
|
479
|
-
### Email Notifications
|
|
480
|
-
|
|
481
|
-
Configure email alerts to get notified about suspicious activity:
|
|
482
|
-
|
|
483
|
-
```toml
|
|
484
|
-
[email]
|
|
485
|
-
enabled = true
|
|
486
|
-
provider = "smtp" # "smtp" or "ses"
|
|
487
|
-
from = "firewall@example.com"
|
|
488
|
-
to = ["admin@example.com"]
|
|
489
|
-
alert_on_block_threshold = 100 # Alert when blocks/min > 100
|
|
490
|
-
alert_on_ip_ban = true # Alert when IP is auto-banned
|
|
491
|
-
daily_digest = true # Daily summary at 8:00 UTC
|
|
492
|
-
daily_digest_hour = 8
|
|
493
|
-
|
|
494
|
-
[email.smtp]
|
|
495
|
-
host = "smtp.gmail.com"
|
|
496
|
-
port = 587
|
|
497
|
-
username = "your-email@gmail.com"
|
|
498
|
-
password = "your-app-password"
|
|
499
|
-
tls = true
|
|
500
|
-
```
|
|
501
|
-
|
|
502
|
-
Emails are sent with styled HTML templates showing top blocked IPs, triggered rules, and traffic statistics.
|
|
503
|
-
|
|
504
|
-
### Eagle Eye โ Scheduled Package Monitoring
|
|
505
|
-
|
|
506
|
-
Eagle Eye is a scheduled vulnerability scanner for `infynon pkg`. It monitors multiple project directories on a timer, scans all lock files for CVEs, and sends email alerts when vulnerabilities matching your risk threshold are found.
|
|
507
|
-
|
|
508
|
-
```bash
|
|
509
|
-
# Interactive setup โ configure SMTP, paths, risk level, schedule
|
|
510
|
-
infynon pkg eagle-eye setup
|
|
511
|
-
|
|
512
|
-
# Start monitoring (runs in foreground)
|
|
513
|
-
infynon pkg eagle-eye start
|
|
514
|
-
|
|
515
|
-
# Check current configuration
|
|
516
|
-
infynon pkg eagle-eye status
|
|
517
|
-
|
|
518
|
-
# Enable/disable monitoring
|
|
519
|
-
infynon pkg eagle-eye enable
|
|
520
|
-
infynon pkg eagle-eye disable
|
|
521
|
-
```
|
|
522
|
-
|
|
523
|
-
**Features:**
|
|
524
|
-
- Monitor multiple project directories simultaneously
|
|
525
|
-
- Configurable scan interval (default: every 24 hours)
|
|
526
|
-
- Risk level threshold: choose which severities trigger alerts (CRITICAL, HIGH, MEDIUM, LOW, ALL)
|
|
527
|
-
- SMTP email alerts with styled HTML templates showing per-project vulnerability breakdown
|
|
528
|
-
- Enable/disable toggle without losing configuration
|
|
529
|
-
- Config stored in `~/.infynon/eagle-eye.toml`
|
|
87
|
+
**Protects against:** SQL injection ยท XSS ยท path traversal ยท command injection ยท header injection ยท rate abuse ยท bad IPs
|
|
530
88
|
|
|
531
89
|
---
|
|
532
90
|
|
|
533
|
-
##
|
|
534
|
-
|
|
535
|
-
INFYNON currently focuses on:
|
|
91
|
+
## How It Works (Package Security)
|
|
536
92
|
|
|
537
|
-
|
|
538
|
-
|
|
539
|
-
|
|
93
|
+
1. You (or an AI tool) runs `infynon pkg npm install express`
|
|
94
|
+
2. INFYNON resolves the full dependency tree
|
|
95
|
+
3. Queries **OSV.dev** for known CVEs across all packages
|
|
96
|
+
4. Presents an interactive decision for any vulnerable package โ block, skip, or install a fixed version
|
|
97
|
+
5. Only approved packages get installed
|
|
540
98
|
|
|
541
99
|
---
|
|
542
100
|
|
|
543
|
-
##
|
|
544
|
-
|
|
545
|
-
Want to try the latest features before they hit stable? Follow the **development** branch:
|
|
546
|
-
|
|
547
|
-
```bash
|
|
548
|
-
# Clone the development branch
|
|
549
|
-
git clone -b development https://github.com/d4rkNinja/infynon-cli.git
|
|
550
|
-
cd infynon-cli
|
|
101
|
+
## More Commands
|
|
551
102
|
|
|
552
|
-
|
|
553
|
-
|
|
554
|
-
|
|
555
|
-
|
|
556
|
-
|
|
557
|
-
|
|
558
|
-
|
|
559
|
-
|
|
560
|
-
|
|
561
|
-
|
|
562
|
-
|
|
563
|
-
|
|
564
|
-
|
|
565
|
-
|
|
566
|
-
|
|
567
|
-
**Watch the branch** for updates: [github.com/d4rkNinja/infynon-cli/tree/development](https://github.com/d4rkNinja/infynon-cli/tree/development)
|
|
103
|
+
| Command | Description |
|
|
104
|
+
|---------|-------------|
|
|
105
|
+
| `infynon pkg scan` | Scan lock files for CVEs |
|
|
106
|
+
| `infynon pkg fix --auto` | Auto-upgrade all vulnerable deps |
|
|
107
|
+
| `infynon pkg audit` | Full dependency tree with CVE annotations |
|
|
108
|
+
| `infynon pkg why <pkg>` | Trace why a package is in your tree |
|
|
109
|
+
| `infynon pkg outdated` | Find outdated deps across all ecosystems |
|
|
110
|
+
| `infynon pkg diff <pkg> v1 v2` | Compare versions: size, deps, CVEs |
|
|
111
|
+
| `infynon pkg doctor` | Health check: dupes, unused, phantoms |
|
|
112
|
+
| `infynon pkg size <pkg>` | Install weight and transitive dep count |
|
|
113
|
+
| `infynon pkg search <query>` | Cross-ecosystem package search |
|
|
114
|
+
| `infynon pkg clean` | Remove unused dependencies |
|
|
115
|
+
| `infynon pkg migrate <from> <to>` | Migrate between package managers |
|
|
116
|
+
| `infynon pkg eagle-eye setup` | Set up scheduled CVE monitoring with email alerts |
|
|
568
117
|
|
|
569
118
|
---
|
|
570
119
|
|
|
571
|
-
##
|
|
572
|
-
|
|
573
|
-
INFYNON integrates with [Claude Code](https://claude.ai/code) via official plugins. Once installed, Claude Code automatically knows how to help you use every INFYNON command โ scanning, fixing, firewall setup, rule authoring, and more.
|
|
574
|
-
|
|
575
|
-
### Install the Plugin
|
|
576
|
-
|
|
577
|
-
```bash
|
|
578
|
-
# 1. Add the Code Guardian marketplace
|
|
579
|
-
/plugin marketplace add d4rkNinja/code-guardian
|
|
580
|
-
|
|
581
|
-
# 2. Install INFYNON plugins
|
|
582
|
-
/plugin install infynon-pkg@d4rkNinja
|
|
583
|
-
/plugin install infynon-firewall@d4rkNinja
|
|
584
|
-
|
|
585
|
-
# 3. Reload to activate
|
|
586
|
-
/reload-plugins
|
|
587
|
-
```
|
|
588
|
-
|
|
589
|
-
### What You Get
|
|
590
|
-
|
|
591
|
-
| Plugin | What Claude Code Learns |
|
|
592
|
-
|--------|------------------------|
|
|
593
|
-
| **infynon-pkg** | All `infynon pkg` commands โ scan, fix, audit, why, outdated, diff, doctor, size, search, clean, migrate, eagle-eye. Auto-triggers when it detects lock files in your project. |
|
|
594
|
-
| **infynon-firewall** | All `infynon` firewall commands โ init, start, monitor, block/unblock, rules, logs, config. Full `infynon.toml` configuration guide, TUI shortcuts. Auto-triggers when it detects `infynon.toml`. |
|
|
595
|
-
|
|
596
|
-
Once installed, just ask Claude Code things like:
|
|
597
|
-
- *"Scan my project for vulnerabilities"*
|
|
598
|
-
- *"Set up a firewall for my Express backend on port 3000"*
|
|
599
|
-
- *"Fix all critical CVEs in this project"*
|
|
600
|
-
- *"Help me write a custom WAF rule to block scanners"*
|
|
120
|
+
## Full Documentation
|
|
601
121
|
|
|
602
|
-
|
|
122
|
+
**[cli.infynon.com/docs](https://cli.infynon.com/docs)**
|
|
603
123
|
|
|
604
|
-
|
|
124
|
+
Source: [github.com/d4rkNinja/infynon-cli](https://github.com/d4rkNinja/infynon-cli)
|
|
605
125
|
|
|
606
126
|
---
|
|
607
127
|
|
|
608
|
-
##
|
|
128
|
+
## License
|
|
609
129
|
|
|
610
|
-
|
|
611
|
-
* SQLite event database for historical queries
|
|
612
|
-
* Webhook alerts (Slack, Discord, email)
|
|
613
|
-
* LLM-based deep inspection (Layer 3 โ local Ollama)
|
|
614
|
-
* AI-powered anomaly detection and rule suggestion
|
|
615
|
-
* SBOM generation (CycloneDX) after every install
|
|
616
|
-
* TLS termination support
|
|
617
|
-
* Health check endpoints
|
|
130
|
+
MIT
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "infynon",
|
|
3
|
-
"version": "0.2.0-beta.6.
|
|
3
|
+
"version": "0.2.0-beta.6.3",
|
|
4
4
|
"description": "Universal package security manager & network firewall โ intercepts installs across npm, pip, cargo, go, gem and more with 3-layer CVE verification, plus a real-time reverse proxy WAF with TUI dashboard",
|
|
5
5
|
"bin": {
|
|
6
6
|
"infynon": "./run.js",
|
|
@@ -13,8 +13,7 @@
|
|
|
13
13
|
"files": [
|
|
14
14
|
"run.js",
|
|
15
15
|
"postinstall.js",
|
|
16
|
-
"preuninstall.js"
|
|
17
|
-
"README.md"
|
|
16
|
+
"preuninstall.js"
|
|
18
17
|
],
|
|
19
18
|
"engines": {
|
|
20
19
|
"node": ">=14"
|